Happy 2006 to you all! One of my customers is getting a strange error since someone disabled (deleted actually!!) the Terminal Server service on their Windows 2003 Server SP1. The error that pops up is: "Windows Firewall cannot run because another program or service is running that might use the...

Respected recipient, I am currently having a trouble in uninstalling Norton anti-virus VMI update. My company got Norton anti virus software installed on the system from the Norton anti virus software CD and it was not Norton system works, just the Norton anti virus software. After somedays, it...

For some reason, at random, among 20 PCs on my network, in the morning or during the day, the network connection stops responding for both intranet and internet communications. The only solution thus far is to remove the NIC from the Device Manager, reboot the PC, and let Windows XP Pro find the...

Hi, I'm reviewing access controls for a list of applications and some of the app owners claim they don't have human users. Is there a way to validate that? What procedures and evidence would give an auditor a good level of assurance that the app indeed has no users? Thanks. P.S. I'm not talking...

We are a company where we have experience on network remote administration and now we have open a new area, The area of security. Now I need to start to make new procedures like when a new customer come to us and ask if we can handle the security for his network. I need to know if some one can...

Is there a way to verify list of users granted access to sensitive commands ADDAUTLE| CHGAUTLE| CHGDTA.....? As these commands are executed at the green screen of the systems. How to identify who has access to the green screen.

Some of the system commands are considered to be powerful like, {*USRPRF,*AUTHLR, CHGSYSLIBL, CHGSYSVAL, etc}. 1. Limiting capability does not restrict a user from executing a command. If so how can we restrict the user access to these commands? 2. Is there way to list all users with the access to...

Hi, I am using VPN concentrator 3500. Please let me know how to limit access to certain users that have a VPN account on the VPN Concentrator on certain server when they VPN in. Looking forward to hearing from you, With thanks and regards, Helal

MS Access, I'm looking for a way through code, property or expression, to emulate F2 key. In other words, as you tab through fields in an Access form to have the cursor enter those fields in edit mode (insertion point at beginning of field) instead of navigation mode where the whole field is...

Is it possible to setup an access list for allowed computers on the network and prevent others from using any network resources like internet and printers. Even with a valid username and password I want them blocked if they are not on the Access Control List.

We are currently in the middle of figuring out the approach we are going to take in regard to a user having admin rights on their system. Typcially we set up a new user as an administrator on their system when they are logged into the domain. They don't have a local admin account on the system,...

Hi, I need to be able to combine (concatenate?) fields in Access so that each item in Field 1 is joined to each item in Fields 2 thru 5. I have tried to illustrate this in the samples below... In the samples below, Account code is in Field 1... String(s) to be added are in Field 2. Then in Field 3...

If I want to share a file XP to XP, I type the IP address of the other XP system and am then asked for the username and password to access the system files. If I try to access the files again, it will not ask for the username and password. How do I configure this so that I am prompted for the...

To follow this tag...

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States.
Privacy